|Publication number||US7562387 B2|
|Application number||US 09/949,364|
|Publication date||Jul 14, 2009|
|Priority date||Sep 7, 2001|
|Also published as||US20030051157|
|Publication number||09949364, 949364, US 7562387 B2, US 7562387B2, US-B2-7562387, US7562387 B2, US7562387B2|
|Inventors||Bing Quang Nguyen, Mary Catherine Streble|
|Original Assignee||International Business Machines Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (17), Non-Patent Citations (4), Referenced by (16), Classifications (6), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The invention pertains to the collection by Web site operators of information about Web site usage by individuals. More particularly, the invention pertains to the collection of information relating to users' identities in such environments.
The Internet is a vast collection of computing resources, interconnected as a network, from sites around the world. It is used every day by millions of individuals. The World Wide Web (referred to herein as the “Web”) is that portion of the Internet that uses the Hyper text Transfer Protocol (“HTTP”) as a protocol for exchanging messages. (Alternatively, the “HTTPS” protocol can be used, where this protocol is a security-enhanced version of HTTP.)
A user of the Internet typically accesses and uses the Internet by establishing a network connection through the services of an Internet Service Provider (ISP). An ISP provides computer users the ability to dial a telephone number using their computer modem (or other connection facility, such as satellite transmission), thereby establishing a connection to a remote computer owned or managed by the ISP. This remote computer then makes services available to the user's computer. Typical services include: a search facility to search throughout the interconnected computers of the Internet for files of interest to the user; a browse capability for displaying information files located with the search facility; and an electronic mail facility, with which the user can send and receive mail messages from other computer users.
The HTTP communications protocol uses a request/response paradigm, where the electronic messages sent between communicating computers can be categorized as either requests for information or responses to those requests.
The user working in a Web environment will have software running on his or her computer to allow him or her to create and send requests for information onto the Internet, and to see the results. These functions are typically combined in a software package that is referred to as a “Web browser”, or “browser”. After the user has created a request using the browser, the request message is sent out into the Internet (typically, via an ISP as described above). The target of the request message is one of the interconnected computers in the Internet network. That computer receives the message, attempts to find the data satisfying the user's request, formats that data for display with the user's browser, and returns the formatted response to the browser software running on the user's computer.
This is an example of a client-server model of computing, where the computer at which the user requests information is referred to as the client or client machine, and the computer that locates the information and returns it to the client is the server or server machine. In the Web environment, the server is referred to as a “Web server”.
Content on the Internet is served in individual files in the form of HTML pages. HTML (Hyper Text Markup Language) is a Web content formatting language specifically designed for a distributed network such as the Internet. An HTML page contains HTML code, which indicates how the information content is to be displayed, as well as at least some of the actual content. Pages also typically contain references to other files where at least some of the content is contained. Web browser software is designed to issue requests for pages in the form of URLs (Universal Resource Locators). A URL essentially is an address of a file that is accessible through the Internet. The URL includes the name of the file that is being requested and the IP (Internet Protocol) address of the server on which it is to be found.
A user at a client machine may type a URL into an appropriate field in a GUI (Graphical User Interface) generated by the Web browser software in order to address Web pages. Another way of addressing Web pages is by hyperlinking. A hyperlink is a portion in one Web page, such as a portion of text or an image, that, when selected (such as by positioning a cursor over that portion and pressing a button on the cursor control device), automatically addresses another Web page. Thus, for example, by manipulating one's mouse to cause the screen cursor to move over a hyperlink and clicking, the page addressed by that hyperlink is accessed by the browser.
Each request is routed through the Internet to the server identified in the URL. That server then returns the requested page through the Internet to the client machine that requested it. The Web browser software reads the HTML code in the page and, if that page contains references to other files containing some of the content, the browser software sends further requests for those files. It displays the content (whether contained directly in the HTML page or in another file referenced within the HTML page) in a manner dictated by the HTML code in the page.
Countless commercial, educational, government and other institutions operate servers containing HTML pages that are accessible to client machines via the Internet. The term “Web site” generally refers to a collection of HTML pages that are maintained on (or generated on-the-fly by) one or more servers by or on behalf of a single entity and that are related to each other in some fashion.
HTTP does not provide for maintaining any type of state information about the communications, instead treating each request/response pair as a separate and unrelated transaction. However, there are many cases for which it is desirable to associate multiple HTTP requests from a client to a server with each other so as to be able to maintain state information.
One example scenario where state information is an absolute necessity is on-line shopping, including the gathering of user profile information. In on-line shopping, a user typically accesses a seller's on-line catalog, which will be displayed to the user as some number of Web pages. Typically, the user can display a separate page of information related to each product, to read about the details of that product. Typically, each time the user requests to see a page, a separate HTTP request is sent to the Web server where the seller's product catalog is stored. When the user wishes to order a product, he indicates his selection by clicking on an “Order” button of some type using a mouse, for example. This causes another request message to be sent to the server, where the request indicates that this is an order for the particular item.
Without the ability to maintain state information, each of these requests would be treated as unrelated to the others. There would be no efficient way to collect orders for more than one item into one large order. Further, there would be no efficient way to allow the user to enter his name, address, credit card number, etc. only one time, and have that information apply to all the ordered items.
Even further, it also frequently is desirable to be able to maintain state information across multiple, separate, visits by a particular individual to a particular Web site. For instance, it may be desirable for a retail Web site to store all of the information that it typically gathers to process a purchase order by an individual and associate that information with the individual every time he or she visits the Web site. Then the individual will not need to re-enter the same information, such as name, credit card No., billing address, shipping address, etc., every time he or she visits the Web site and purchases an item.
Cookies are small data files that a server might send to a client machine and that the client's Web browser knows to store in a designated cookie folder. A cookie contains pertinent information about the user as well as information that the browser uses to determine the particular Web site (i.e., URL) to which the cookie pertains. Thereafter, when that client machine sends a HTTP request for a Web page meeting the URL criteria set forth in the cookie, the client's Web browser software includes that cookie in the request. The purpose of cookies is to inform a server of relevant information about the particular user (or at least the particular client machine that issued the request). Cookies might contain any particular information that a Web site operator feels the need to have in order to better service its customers.
URL rewriting is a technology that can serve most of the same functions as cookies for situations in which cookies are disabled on a particular client machine or if cookies are otherwise undesirable or impossible to use. Briefly, in URL rewriting, the data that would have been contained in a cookie is appended to the end of the URL in the request. URL rewriting and particularly its use as a substitute for cookies is well known in the art.
Large Web site operators may own their own server (or a server farm comprising multiple servers) dedicated to a single “Web site”. On the other hand, smaller Web site operators may farm out maintenance of their Web sites to other companies that might support multiple Web sites on a single physical server machine. These companies are commonly called Web hosts or Web hosting companies.
Many Web site operators, and particularly commercial Web site operators, have a desire to identify and attract as many persons as possible with an interest in the particular subject matter of the Web site as often as possible. One step that typically is necessary to achieve this goal is to collect personal information about the individuals that visit the Web site. Such information provides at least two avenues of attracting visits. First, personal information such as e mail address, mailing address and telephone number enable the Web site operator to contact the individual with advertising or other information of interest. Secondly, a collection of demographic information about a large number of visitors to the Web site may enable a Web site operator to determine demographics of its target audience and thus better target advertising or other information to persons with similar demographic profiles.
Personal information can be collected by asking visitors to the Web site to provide personal information in an online form or questionnaire.
The same type of personal and demographic information about individuals that visit other Web sites that have similar focuses as (or focuses that are known to have a high demographic cross-correlation with) the focus of the particular Web site also can be useful in targeting advertising towards those individuals.
Many companies are willing to sell or otherwise share the personal information it gathers about visitors to its Web site with other companies.
Another aspect of attracting and keeping customers is making Web sites as convenient and attractive to users as possible so that they will be more inclined to return to the Web site. Accordingly, many Web site operators have a strong desire to keep track of the ways in which individuals utilize the Web site in order to determine which aspects of a Web site users like or dislike. Useful information in terms of making such determinations include things such as (1) from what other Web sites users have hyperlinked to your Web site, (2) which pages on your Web site receive the most and/or fewest hits, (3) how long users tend to view a particular page, (4) on which pages users have entered the Web site, (5) from which pages users have exited the Web site (to go to another Web site or log off the Internet altogether), and (6) the particular browser software used by visitors. This type of data is commonly termed click stream data.
Traditional log file analysis techniques can be used to gather click stream data of users of a particular Web site to develop a log of data indicating the page (or resource) requests made by Web site users in order to collect some of the aforementioned useful information.
As is well known to those of skill in the art of Web site design and Web hosting, cookies are used extensively in gathering and tracking such information. For instance, a cookie identifying the particular user (or at least the particular client machine) can be included in each request, thus allowing tracking of one's progress through a Web site. The same objectives can be accomplished using URL rewriting.
A technology called “Single-Pixel” technology has been developed that can be used to gather information similar to the information gathered through traditional log file analysis. With Single-Pixel technology, tags can be embedded in an HTML page that cause the browser at the client machines that receive that page to send click stream information in the form of cookies (or rewritten URLs) to a click stream analysis (also called a usage analyzer) engine on a server on the Web. That server typically is (but need not be) a separate server from the server of the particular Web site that is serving the content responsive to the client machine's requests. Other methods also are known for sending Single-Pixel data for collecting click stream information. Such other methods include query string parameters and hidden form data. The usage analyzer engine maintains a log containing information for each request it receives. The log entries can be analyzed and correlated to derive the aforementioned type of information.
Web hosting companies are particularly interested in click stream and other Web site usage information and often share such information gathered with respect to each of the companies to which it provides Web hosting services (i.e., its customers) with all of its customers.
Many individuals who use the Internet find this sort of gathering of personal information and Web surfing habits about themselves offensive or do not want such information about them to be gathered.
Accordingly, it is an object of the present invention to provide an improved method and apparatus of gathering click stream information.
It is another object of the present invention to provide a method and apparatus for gathering click stream information while preserving the privacy of the individuals from whom the information is gathered.
Let us assume that server 16 a supports a large commercial Web site that offers for sale all forms of electronic equipment, including computers, audio products, televisions and other video products, software, printers, and accessories for all of the above. Let us also assume that the Web site operator wishes to collect click stream information as well as personal information from its visitors. The Web site utilizes cookies and/or URL rewriting and Single-Pixel technology in a manner well known in the prior art to collect click stream information from its visitors. Personal information also is gathered in the usual manner, including the use of electronic forms in which the user is requested to provide such information. Even if the Web site does not have such a form for all visitors, any visitor who has purchased anything through the Web site had to have provided such information at the time of purchase in order to complete the purchase. The Web site operator can associate the personal information with the click stream data either by embedding the personal information directly within the cookies sent to the client machines' cookie folder or by placing a unique ID in those cookies, which ID can be later associated with the user's personal information maintained locally by the Web site operator. In either event, the click stream data is sent to a usage analyzer software engine on a separate server 16 b. As previously mentioned, with Single-Pixel technology, tags are embedded in the HTML pages of the Web site that cause the browsers at the client machines that receive the pages to send click stream information in the form of cookies, URL parameters, hidden form data, etc. to the usage analyzer server 16 b.
Thus, the log generated by the usage analyzer will either directly contain personal information or contain user IDs from which it will be possible to retrieve the personal information.
However, in accordance with the present invention, the user ID and/or personal information contained in the log can be eliminated, either automatically for all log entries or only for those log entries for which the corresponding user has indicated a desire to block personal information.
It generally will not be practical to eliminate personal information from cookies, especially the cookies used in connection with the gathering of click stream information through the usage analyzer engine. Specifically, it is generally necessary to maintain some state information so that individual requests from a single client machine can be associated with each other at the Web site. As previously described, this usually is necessary to provide a satisfying web surfing experience for visitors and is an absolute necessity for essentially any type of transaction, such as sales transactions. Thus, in accordance with the invention, in the log created and maintained by the usage analyzer engine, any fields of information in a received cookie deemed to comprise personal information are overwritten with a default value that contains no personal information about the visitor (or client machine) from which it was received. The overwriting can be applied to any field or type of information in the entry. Accordingly, the term “personal information” as used herein essentially can be whatever information the Web site operator or user deems it to be. In fact, the invention can be applied to any type of information and is not necessarily restricted to blocking “personal information”.
It should be understood that the Web site operator may offer more than two levels of privacy. Each increasing privacy level translating into additional fields of data that will be overwritten with default values. In such cases, the flag would need to be more than one bit wide in order to denote which of the multiple privacy levels for which a visitor has opted.
In any event, when the usage analyzer engine receives cookies, it parses them to retrieve the click stream and/or other information that will be placed in the corresponding log entry. As part of the parsing, it encounters the privacy flag, determines its condition and, depending on its condition, overwrites one or more fields in the log entry with default data that does not contain any personal information.
In this manner, those users requesting a certain level of privacy, can have that privacy while still allowing the Web site operator to collect as much other information as it desires. For instance, if we consider a simple example in which the only “personal information” in the cookie is a user ID, that field can be replaced with a default field yet the logged entry will still contain the useful click stream information (as well as all other information that may have been in the cookie). Thus, the Web site operator still can gather click stream and/or demographic information from all visitors without gathering actual personal information. Thus, the Web site operator will still be able to obtain useful information such as the other Web sites from which visitors tend to arrive at the present Web site, the pages of the Web site where users tend to enter and exit, the manner in which user's tend to progress through the Web site, the pages of the Web site that receive the most hits, the pages of the Web site that receive the fewest hits, etc.
If the privacy field in the cookie is not set to enhanced privacy, flow simply proceeds from step 305 directly to step 309, where the entry is created in the log with the original data in the personal information fields. The process ends at step 311.
As is well known, all requests issued by client machines include as part of the request an IP address of the requesting client machine. In the case of client machines that access the Internet through an ISP, the client machine is assigned a new IP address each time it logs on to the Internet through the ISP. Client machines that have a more direct connection to the Internet typically have a single IP address that does not change. In either event, the IP address of the client machine can be considered personal information. For instance, even in the case of client machines that access the Internet through an ISP, the ISP may maintain records through which the IP address can be correlated to a particular individual or client machine. Accordingly, the present invention can also be applied to the IP address contained in the request. More particularly, if the Web site operator includes an IP address field in its log at the Usage Analyzer server, that information can be overwritten with default data if the user selects enhanced privacy. Alternately, in those embodiments of the invention in which the Web site operator universally does not collect certain types of private information, the IP address field can be overwritten with default data in all of the log entries.
While the invention has heretofore been described in connection with the Internet and the Web, it is applicable to any network environment in which client machines coupled to said network request network resources (files) from servers coupled to said network.
Having thus described a few particular embodiments of the invention, various alterations, modifications, and improvements will readily occur to those skilled in the art. Such alterations, modifications and improvements as are made obvious by this disclosure are intended to be part of this description though not expressly stated herein, and are intended to be within the spirit and scope of the invention. Accordingly, the foregoing description is by way of example only, and not limiting. The invention is limited only as defined in the following claims and equivalents thereto.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6085224 *||Mar 11, 1997||Jul 4, 2000||Intracept, Inc.||Method and system for responding to hidden data and programs in a datastream|
|US6122661||Apr 29, 1999||Sep 19, 2000||Wall Data Incorporated||Method of accessing information on a host computer from a client computer|
|US6128738||Apr 22, 1998||Oct 3, 2000||International Business Machines Corporation||Certificate based security in SNA data flows|
|US6490601 *||Jan 15, 1999||Dec 3, 2002||Infospace, Inc.||Server for enabling the automatic insertion of data into electronic forms on a user computer|
|US6532459 *||Dec 13, 1999||Mar 11, 2003||Berson Research Corp.||System for finding, identifying, tracking, and correcting personal information in diverse databases|
|US6581072 *||May 17, 2001||Jun 17, 2003||Rakesh Mathur||Techniques for identifying and accessing information of interest to a user in a network environment without compromising the user's privacy|
|US6851060 *||Jul 15, 1999||Feb 1, 2005||International Business Machines Corporation||User control of web browser user data|
|US6944766 *||Apr 26, 2001||Sep 13, 2005||Canon Kabushiki Kaisha||Information processing apparatus|
|US6959420 *||Nov 30, 2001||Oct 25, 2005||Microsoft Corporation||Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy|
|US7103656 *||Feb 20, 2002||Sep 5, 2006||Research In Motion Limited||System and method for administrating a wireless communication network|
|US20010049620 *||Feb 28, 2001||Dec 6, 2001||Blasko John P.||Privacy-protected targeting system|
|US20020143770 *||Mar 28, 2001||Oct 3, 2002||Ascentive Llc||System and method for network administration and local administration of privacy protection criteria|
|US20020156917 *||Jan 10, 2002||Oct 24, 2002||Geosign Corporation||Method for providing an attribute bounded network of computers|
|US20050187786 *||Apr 22, 2005||Aug 25, 2005||Tsai Daniel E.||Electronic commerce using personal preferences|
|US20050250440 *||Oct 6, 2004||Nov 10, 2005||Zhou Peter Y||Systems and methods for monitoring and tracking|
|US20070038765 *||Jul 10, 2006||Feb 15, 2007||Microsoft Corporation||User-centric consent management system and method|
|WO2000023932A2||Oct 21, 1999||Apr 27, 2000||Lend Lease Corporation Ltd.||Marketing systems and methods that preserve consumer privacy|
|1||*||"Childrens Online Privacy Protection Rule; Final Rule" Nov. 1999, FTC.|
|2||*||"So you want a Cookie, Huh?" Burns, www.htmlgoodies.com, 1999.|
|3||*||"The Single-Pixel GIF Trick", www.dsiegel.com/tips/wonk5/single.html, Mar. 14, 1996.|
|4||*||(COPPA) Children's Online Privacy Protection Act of 1998.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7853684 *||Oct 15, 2002||Dec 14, 2010||Sas Institute Inc.||System and method for processing web activity data|
|US8489576 *||Mar 24, 2008||Jul 16, 2013||Motorola Mobility Llc||Methods and apparatus for using information regarding actions performed using traceable objects|
|US8650621||Sep 3, 2010||Feb 11, 2014||Virtual Piggy, Inc.||System and method for verifying the age of an internet user|
|US8676504||Jun 25, 2013||Mar 18, 2014||Motorola Mobility Llc||Methods and apparatus for collecting and using information regarding location object-based actions|
|US8762230||Mar 27, 2012||Jun 24, 2014||Virtual Piggy, Inc.||System and method for virtual piggy bank wish-list|
|US8812395||Sep 28, 2011||Aug 19, 2014||Virtual Piggy, Inc.||System and method for virtual piggybank|
|US9060245||Oct 30, 2007||Jun 16, 2015||Google Technology Holdings LLC||Methods and apparatus for collecting and using information regarding location object-based actions|
|US9152820 *||Mar 30, 2012||Oct 6, 2015||Emc Corporation||Method and apparatus for cookie anonymization and rejection|
|US9203845||Sep 3, 2010||Dec 1, 2015||Virtual Piggy, Inc.||Parent match|
|US20040073644 *||Oct 15, 2002||Apr 15, 2004||Koch Donald O.||System and method for processing web activity data|
|US20090112460 *||Oct 30, 2007||Apr 30, 2009||Motorola, Inc.||Methods and apparatus for collecting and using information regarding location object-based actions|
|US20090112924 *||Mar 24, 2008||Apr 30, 2009||Motorola, Inc.||Methods and apparatus for using information regarding actions performed using traceable objects|
|US20110184855 *||Sep 3, 2010||Jul 28, 2011||Jo Webber||System and method for virtual piggybank|
|US20110185399 *||Sep 3, 2010||Jul 28, 2011||Jo Webber||Parent match|
|US20130290179 *||Jun 25, 2013||Oct 31, 2013||Motorola Mobility Llc||Methods and apparatus for using information regarding actions performed using traceable objects|
|EP3046038A1||Jan 13, 2015||Jul 20, 2016||Telefonica Digital Espaņa, S.L.U.||A computer-implemented method, a network device and computer program products for tracking OPT-OUT user preferences in a global communication network|
|International Classification||H04L9/00, H04L29/06|
|Cooperative Classification||H04L63/102, H04L63/04|
|Sep 7, 2001||AS||Assignment|
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NGUYEN, BINH QUANG;STREBLE, MARY CATHERINE;REEL/FRAME:012162/0057
Effective date: 20010904
|Feb 25, 2013||REMI||Maintenance fee reminder mailed|
|Apr 18, 2013||SULP||Surcharge for late payment|
|Apr 18, 2013||FPAY||Fee payment|
Year of fee payment: 4